摘要:
Example embodiments provide a method and/or network element capable of mitigating one or more effects of operating at full capacity. According to an example embodiment, a network element may address load capacity by identifying that a first network element (e.g., a femto) is operating at a threshold capacity. If a communication from a second network element intended for the first network element is received, an operation is performed that informs the second network element of at least one of (i) that the first network element is operating at a threshold capacity and (ii) that the communication cannot be delivered to the first network element while the first network element is operating at a threshold capacity.
摘要:
Example embodiments provide a method and/or network element capable of mitigating one or more effects of operating at full capacity. According to an example embodiment, a network element may address load capacity by identifying that a first network element (e.g., a femto) is operating at a threshold capacity. If a communication from a second network element intended for the first network element is received, an operation is performed that informs the second network element of at least one of (i) that the first network element is operating at a threshold capacity and (ii) that the communication cannot be delivered to the first network element while the first network element is operating at a threshold capacity.
摘要:
Example embodiments are directed to a system for providing wireless services to a first user on the system after a handoff from a first mobile switching center to a second mobile switching center. The system includes a first application server configured to provide wireless services and coupled to the second mobile switching center. The second mobile switching center serves the first user. A second application server is configured to provide wireline services and interact with the second application server to provide the wireless and wireline services to the first user.
摘要:
An exemplary method of facilitating hand-offs between Femtocells includes receiving an indication of a cell identifying code detected by a mobile station currently communicating with a serving Femtocell. A determination is made whether the received cell identifying code corresponds to a known Femtocell. The known Femtocell becomes a target Femtocell if a successful hand-off was previously made from the serving Femtocell to the known Femtocell. A hand-off is instigated to the target Femtocell.
摘要:
An exemplary method of facilitating hand-offs between Femtocells includes receiving an indication of a cell identifying code detected by a mobile station currently communicating with a serving Femtocell. A determination is made whether the received cell identifying code corresponds to a known Femtocell. The known Femtocell becomes a target Femtocell if a successful hand-off was previously made from the serving Femtocell to the known Femtocell. A hand-off is instigated to the target Femtocell.
摘要:
The present invention provides a method involving a femtocell in communication with an Internet Protocol Multimedia Subsystem (IMS) network. In one embodiment, the femtocell operates according to code division multiple access (CDMA) standards. The method includes receiving, from the femtocell and at a first secure entity in the IMS network, first authentication information generated by the mobile unit using a first random number broadcast by the femtocell in a global challenge. The method also includes receiving, from a second secure entity in the secure network, at least one security key formed based on the global challenge and second authentication information for uniquely challenging the mobile unit. In one embodiment, the second secure entity is a CDMA-based authentication server. The method further includes providing the security key(s) to the femtocell in response to authenticating the mobile unit based upon the second authentication information.
摘要:
The present invention provides a method involving a femtocell in communication with an Internet Protocol Multimedia Subsystem (IMS) network. In one embodiment, the femtocell operates according to code division multiple access (CDMA) standards. The method includes receiving, from the femtocell and at a first secure entity in the IMS network, first authentication information generated by the mobile unit using a first random number broadcast by the femtocell in a global challenge. The method also includes receiving, from a second secure entity in the secure network, at least one security key formed based on the global challenge and second authentication information for uniquely challenging the mobile unit. In one embodiment, the second secure entity is a CDMA-based authentication server. The method further includes providing the security key(s) to the femtocell in response to authenticating the mobile unit based upon the second authentication information.
摘要:
The present invention provides a method involving a femtocell in communication with a secure core network such as an Internet Protocol Multimedia Subsystem (IMS) network. The method includes receiving, from the femtocell and at a first secure entity in the IMS network, a global challenge including information indicating a random number. The method also includes receiving an authentication response computed by a mobile unit based on the random number and the first key known by the mobile unit and not known by the femtocell. The method further includes determining, at the first secure entity, that the random number is a legitimate random number provided to the femtocell by the IMS network.
摘要:
The present invention provides a method involving a femtocell in communication with an Internet Protocol Multimedia Subsystem (IMS) network. In one embodiment, the femtocell operates according to code division multiple access (CDMA) standards. The method includes receiving, from the femtocell and at a first secure entity in the IMS network, first authentication information generated by the mobile unit using a first random number broadcast by the femtocell in a global challenge. The method also includes receiving, from a second secure entity in the secure network, at least one security key formed based on the global challenge and second authentication information for uniquely challenging the mobile unit. In one embodiment, the second secure entity is a CDMA-based authentication server. The method further includes providing the security key(s) to the femtocell in response to authenticating the mobile unit based upon the second authentication information.
摘要:
The present invention provides a method involving a femtocell in communication with a secure core network such as an Internet Protocol Multimedia Subsystem (IMS) network. The method includes receiving, from the femtocell and at a first secure entity in the IMS network, a global challenge including information indicating a random number. The method also includes receiving an authentication response computed by a mobile unit based on the random number and the first key known by the mobile unit and not known by the femtocell. The method further includes determining, at the first secure entity, that the random number is a legitimate random number provided to the femtocell by the IMS network.